Reed Elsevier

Displaying 1-40 of 914 results

  • White Papers // Jun 2009

    Knowledge-Assisted Visualization of Seismic Data

    This paper presents novel techniques for knowledge-assisted annotation and computer-assisted interpretation of seism data for oil and gas exploration. The paper describe the existing procedure for oil and gas search which consist of manually extracting information from seismic data and then aggregating it into knowledge in a detail-oriented bottom-up approach....

    Provided By Reed Elsevier

  • White Papers // Aug 2008

    Age Effects on the Employability - Career Success Relationship

    In this paper, the authors investigated the similarity of the factor structure for self-reported versus supervisor-rated employability for two age groups of workers, and then validated a career success enhancing model of employability across the two age groups. The results confirmed a two-factor model including self-reported and supervisor-rated employability as...

    Provided By Reed Elsevier

  • White Papers // Jul 2009

    The Global "War For Talent"

    In this paper, the authors examine the "Global war for talent", the factors that impact it, and organizations' responses to it. Using a comprehensive search of more than 400 contemporary academic and business press articles, the paper reviews relevant research and reassesses the "Talent war". They posit that the dominant...

    Provided By Reed Elsevier

  • White Papers // Feb 2015

    Characterization of the Windows Kernel Version Variability for Accurate Memory Analysis

    Memory analysis is an established technique for malware analysis and is increasingly used for incident response. However, in most incident response situations, the responder often has no control over the precise version of the operating system that must be responded to. It is therefore critical to ensure that memory analysis...

    Provided By Reed Elsevier

  • White Papers // Jun 2011

    Extracting the Windows Clipboard From Physical Memory

    When attempting to reconstruct the events leading up to a cyber-security incident, one potentially important piece of information is the clipboard. The clipboard has been present in Windows since Windows 3.1 and is the mechanism for transferring information from one application to another through copy and pasting actions. Being able...

    Provided By Reed Elsevier

  • White Papers // Jul 2008

    MEGA: A Tool for Mac OS X Operating System and Application Forensics

    Computer forensic tools for Apple Mac hardware have traditionally focused on low-level file system details. Mac OS X and common applications on the Mac platform provide an abundance of information about the user's activities in configuration files, caches, and logs. The authors are developing MEGA, an extensible tool suite for...

    Provided By Reed Elsevier

  • White Papers // Jun 2011

    Empirical Analysis of Solid State Disk Data Retention when used with Contemporary Operating Systems

    Data recovery techniques for platter-based disk drives have remained rather static due to the dominance of the hard disk for the last two decades. Solid state disk drives have differing storage and recall functionality from platter-based disks and require special care when attempting data recovery. Manufacturers have varying implementations of...

    Provided By Reed Elsevier

  • White Papers // Jul 2009

    Using Shellbag Information to Reconstruct User Activities

    Built into Microsoft Windows is the ability for the operating system to track user window viewing preferences specific to Windows Explorer. This information, which is called "ShellBag"' information, is stored in several locations within the Windows Registry in the Windows Operating System. This paper introduces a novel method to examine...

    Provided By Reed Elsevier

  • White Papers // Jul 2008

    The Impact of Microsoft Windows Pool Allocation Strategies on Memory Forensics

    An image of a computer's physical memory can provide a forensic examiner with a wealth of information. A small area of system memory, the non-paged pool, contains lots of information about currently and formerly active processes. As this paper shows, more than 90% of such information can be retrieved even...

    Provided By Reed Elsevier

  • White Papers // Jul 2013

    Anti-Forensic Resilient Memory Acquisition

    Memory analysis has gained popularity in recent years proving to be an effective technique for uncovering malware in compromised computer systems. The process of memory acquisition presents unique evidentiary challenges since many acquisition techniques require code to be run on a potential compromised system, presenting an avenue for anti-forensic subversion....

    Provided By Reed Elsevier

  • White Papers // May 2009

    Life Designing: A Paradigm for Career Construction in the 21st Century

    At the beginning of the 21st century, a new social arrangement of work poses a series of questions and challenges to scholars who aim to help people develop their working lives. Given the globalization of career counseling, the authors decided to address these issues and then to formulate potentially innovative...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    Quality Management of B2C e-Commerce Service Based on Human Factors Engineering

    In this paper, the authors investigate Business-To-Customer (B2C) electronic commerce services from a quality management perspective. They propose a novel quality management approach that is based on human factors engineering to manage e-commerce service quality and operate according to customer needs. First, they screen credible quality requirements and determine their...

    Provided By Reed Elsevier

  • White Papers // Sep 2010

    The Agent-Based Negotiation Process for B2C e-Commerce

    B2C e-commerce is becoming more widespread as more people come to recognize its convenience and its ability to rapidly respond to requests and as more products and services become available. However, many electronic marketplaces, especially in the business-to-consumer, are in essence some kind of search engine where buyers look for...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    Rank B2C e-Commerce Websites in e-Alliance Based on AHP and Fuzzy TOPSIS

    E-alliance is the union of e-commerce and its success and efficiency is related to comprehensive quality of e-commerce. Thus, ranking e-commerce websites in e-alliance is of importance, which is a Multi-Criteria Decision-Making (MCDM) problem. This paper proposes an evaluation model based on Analytic Hierarchy Process (AHP), fuzzy sets and Technique...

    Provided By Reed Elsevier

  • White Papers // Mar 2009

    Strategic Human Resource Management: The Evolution of the Field

    In this paper, the authors take an evolutionary and chronological perspective on the development of Strategic Human Resource Management (SHRM) literature. They divide this body of work into seven themes that reflect the directions and trends researchers have taken over approximately thirty years of research. During this time the field...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Evolvable Hardware: A Synthesis and Analysis Using Different Evolutionary Strategies

    In this paper, Cartesian genetic algorithm with evolutionary strategies are used to synthesize digital circuits like full adder and 2 bit multiplier, constructed with only universal gates. The fitness function and different crossover techniques are also such used that minimum gates are utilized. The Genetic Algorithms (GA) with evolutionary strategies...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    An Efficient Implementation of a Reversible Single Precision Floating Point Multiplier Using 4:3 Compressor

    In this paper, the authors propose an efficient design of a reversible single precision floating point multiplier based on compressor. The single precision floating point multiplier requires the design of an efficient 24x24 bit integer multiplier. In the proposed architecture, the 24x24 bit multiplication operation is fragmented to nine parallel...

    Provided By Reed Elsevier

  • White Papers // Dec 2010

    The Impact of Mobility on the Geocasting Problem in Mobile Ad-Hoc Networks: Solvability and Cost

    The authors present a model of a mobile ad-hoc network in which nodes can move arbitrarily on the plane with some bounded speed. They show that without any assumption on some topological stability, it is impossible to solve the geocast problem deterministically despite connectivity and no matter how slowly the...

    Provided By Reed Elsevier

  • White Papers // Mar 2010

    Security Analysis of Wireless Mesh Backhauls for Mobile Networks

    Radio links are used to provide backhaul connectivity for base stations of mobile networks, in cases in which cable-based alternatives are not available and cannot be deployed in an economic or timely manner. While such wireless backhauls have been predominantly used in redundant tree and ring topologies in the past,...

    Provided By Reed Elsevier

  • White Papers // Feb 2011

    Energy Efficient Wireless Internet Access With Cooperative Cellular Networks

    In this paper, the authors study the energy-aware cooperative management of the cellular access networks of the operators that offer service over the same area. In particular, they evaluate the amount of energy that can be saved by using all networks in high traffic conditions, but progressively switching off networks...

    Provided By Reed Elsevier

  • White Papers // Jan 2011

    Special Issue on "Wireless Multi-Hop Networking for Infrastructure Access"

    Multi-hop wireless networks in all their different forms continue to receive much attention. Multi-hop techniques are viewed as an important component of next generation radio access networks, in which end user terminals may be multiple wireless hops from the wired infrastructure. Most of these multi-hop radio access deployments are characterized...

    Provided By Reed Elsevier

  • White Papers // Jul 2009

    CATCH: A Protocol Framework for Cross-Layer Attacker Traceback in Mobile Multi-Hop Networks

    Flooding-type Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in mobile multi-hop networks due to its limited network/host resources. Attacker traceback is a promising solution to take a proper countermeasure near attack origins, for forensics and to discourage attackers from launching the attacks. However, attacker traceback in...

    Provided By Reed Elsevier

  • White Papers // May 2010

    Security Services Architecture for Secure Mobile Grid Systems

    Mobile Grid is a full inheritor of the Grid with the additional feature that it supports mobile users and resources. Security is an important aspect in Grid based systems, and it is more complex to ensure this in a mobile platform owing to the limitations of resources in these devices....

    Provided By Reed Elsevier

  • White Papers // May 2011

    Efficient Probabilistic Communication Protocol for the Private Identification of RFID Tags by Means of Collaborative Readers

    There is a need for efficient communication protocols that allow the private and scalable deployment of RFID systems with a large number of tags. In this paper, the authors leverage the idea of using distributed, collaborative readers to identify RFID tags and propose a new probabilistic communication protocol for those...

    Provided By Reed Elsevier

  • White Papers // Jan 2011

    Clustered Zigbee Networks With Data Fusion: Characterization and Performance Analysis

    In this paper, the authors analyze the performance of clustered Zigbee Wireless Sensor Networks (WSNs) with data fusion. Performance indicators at both physical (probability of decision error) and network (network transmission rate, throughput, aggregate throughput, delay, and network lifetime) layers are considered. Data fusion is carried out at the Access...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Markov Chain-Based Performance Analysis of Multihop IEEE 802.15.4 Wireless Networks

    In this paper, the authors propose a Markov chain-based analytical framework for modeling the behavior of the Medium Access Control (MAC) protocol in IEEE 802.15.4 wireless networks. Two scenarios are of interest. First, they consider networks where the (sensor) nodes communicate directly to the network coordinator (the final sink). Then,...

    Provided By Reed Elsevier

  • White Papers // Feb 2011

    QoS Capacity of Virtual Wireless Networks

    The allocation of wireless resources to many different services and service providers has resulted in a heavily fractured spectrum and inefficient use. However, new dynamic spectrum capabilities allow the recapture of this wastage. This paper describes the creation of a Virtual Wireless Network (VWN). Taking an approach based on cognitive...

    Provided By Reed Elsevier

  • White Papers // Sep 2009

    Preserving Privacy in Participatory Sensing Systems

    The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby ordinary citizens can now contribute and share information from the urban environment. However, such applications introduce a key research challenge: preserving the privacy of the individuals contributing data. In this paper, the authors study two different...

    Provided By Reed Elsevier

  • White Papers // Feb 2010

    Towards Pre-Standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems

    Different trust and/or reputation models have arisen in the last few years. All of them have certain key processes in common such as scoring, ranking, rewarding, punishing or gathering behavioral information. However, there is not a standardization effort for these kinds of models. Such effort would be beneficial for distributed...

    Provided By Reed Elsevier

  • White Papers // Jul 2009

    Probabilistic Analysis of Wireless Systems Using Theorem Proving

    Probabilistic techniques play a major role in the design and analysis of wireless systems as they contain a significant amount of random or unpredictable components. Traditionally, computer simulation techniques are used to perform probabilistic analysis of wireless systems but they provide inaccurate results and usually require enormous amount of CPU...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    An Efficient Dynamic-Identity Based Signature Scheme for Secure Network Coding

    The network coding based applications are vulnerable to possible malicious pollution attacks. Signature schemes have been well-recognized as the most effective approach to address this security issue. However, existing homomorphic signature schemes for network coding either incur high transmission/computation overhead, or are vulnerable to random forgery attacks. In this paper,...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Mobility Impact in IEEE 802.11p Infrastructureless Vehicular Networks

    Vehicular Ad hoc NETworks (VANETs) are an extreme case of Mobile Ad hoc NETworks (MANETs). High speed and frequent network topology changes are the main characteristics of vehicular networks. These characteristics lead to special issues and challenges in the network design, especially at the Medium Access Control (MAC) layer. In...

    Provided By Reed Elsevier

  • White Papers // Mar 2011

    Understanding Data Center Network Architectures in Virtualized Environments: A View From Multi-Tier Applications

    In recent years, Data Center Network (DCN) architectures received a surge of interest from both the industry and academia. However, evaluation of these newly proposed DCN architectures is limited to MapReduce or scientific computing type of traffic patterns, and none of them provides an in-depth understanding of their performance in...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    A Self-Adaptive Probabilistic Packet Filtering Scheme Against Entropy Attacks in Network Coding

    In this paper, based on a novel Self-adaptive Probabilistic Subset Linear-dependency Detection (S-PSLD) algorithm, the authors propose an efficient packet filtering scheme against entropy attacks in network coding. The scheme verifies the received packets probabilistically instead of exactly, and thus it can rapidly filter out the resultant packets from entropy...

    Provided By Reed Elsevier

  • White Papers // Aug 2009

    Optimal Flow Control for Utility-Lifetime Tradeoff in Wireless Sensor Networks

    In this paper, the authors study the utility-lifetime tradeoff in Wireless Sensor Networks (WSNs) by optimal flow control. They consider the flow control in a more practical way by taking into account link congestion and energy efficiency in their network model, and formulate it as a constrained multi-objective optimization problem....

    Provided By Reed Elsevier

  • White Papers // May 2010

    REACT: An RFID-Based Privacy-Preserving Children Tracking Scheme for Large Amusement Parks

    In this paper, the authors propose an RFID-based privacy-preserving Children Tracking (REACT) scheme for helping locate missing children in large amusement parks and other public venues. The scheme is characterized by the cooperation among RFID readers, storage nodes and control center, which are strategically deployed across the amusement park, as...

    Provided By Reed Elsevier

  • White Papers // Mar 2010

    Interference Aware Resource Allocation for Hybrid Hierarchical Wireless Networks

    This paper addresses the problem of interference aware resource allocation for OFDMA based hybrid hierarchical wireless networks. The authors develop two resource allocation algorithms considering the impact of wireless interference constraints using a weighted SINR conflict graph to quantify the interference among the various nodes: interference aware routing using maximum...

    Provided By Reed Elsevier

  • White Papers // Jun 2009

    Using Cross-Layer Metrics to Improve the Performance of End-To-End Handover Mechanisms

    Network centric handover solutions for all IP wireless networks usually require modifications to network infrastructure which can stifle any potential rollout. This has led researchers to begin looking at alternative approaches. Endpoint centric handover solutions do not require network infrastructure modification, thereby alleviating a large barrier to deployment. Current endpoint...

    Provided By Reed Elsevier

  • White Papers // Jul 2010

    Cooperative Diversity Using Per-User Power Control in the MAC Channel

    The authors consider a multiple access MAC fading channel with two users communicating with a common destination, where each user mutually acts as a relay for the other one as well as wishes to transmit its own information as opposed to having dedicated relays. They wish to evaluate the usefulness...

    Provided By Reed Elsevier

  • White Papers // Nov 2010

    A Survey of Cross-Layer Design for VANETs

    Recently, vehicular communication systems have attracted much attention, fueled largely by the growing interest in Intelligent Transportation Systems (ITS). These systems are aimed at addressing critical issues like passenger safety and traffic congestion, by integrating information and communication technologies into transportation infrastructure and vehicles. They are built on top of...

    Provided By Reed Elsevier